Question 631 :
Which one of the following is not shared by threads?
- program counter
- stack register
- program counter and stack
- register
Question 632 :
________determines when it will be necessary to transfer the process from one node to another.
- Selection policy
- Transfer policy
- Location policy
- Security policy
Question 633 :
Electronic Health Care Systems are examples of _________ Systems.
- Distributed Computing
- Distributed Information
- Distributed pervasive
- Distributed Database
Question 634 :
No special machines manage the network of architecture in which resources are known as
- Peer-to-Peer
- Space based
- Tightly coupled
- Loosely coupled
Question 635 :
It Places replicas one by one each time exhaustively evaluating all possible locations.
- Greedy Approach for replica Management.
- Hotspot for replica Management.
- Sequential Replica Management
- Parallel Replica Management
Question 636 :
What are the characteristics of transaction semantics ?
- Suitable for applications that are concerned about coherence of data
- The users of this model are interested in the atomicity property for their transaction
- Easy to implement in a single processor system
- Write-back enhances access performance
Question 637 :
In order to join or leave a group each process has to broadcast a message.
- flat group
- IETF group
- Collected process Group
- Hierarchical Group
Question 638 :
Suspending, migrating all resources as well as process and then resuming is known as ______.
- Total Freezing
- Pre Transferring
- On demand Exchange
- On demand migration
Question 639 :
Single coordinator approach has the following advantages :
- Simple implementation
- Simple deadlock handling
- Bottleneck
- All of the mentioned
Question 640 :
The method(s) that is/are used for backward recovery in distributed computing is ______.
- Checkpoint
- Message Logging
- Checkpoint and message logging
- Recovery Point
Question 641 :
In Distributed system, _____ can be hidden
- Replication
- Fault tolerance
- concurrency
- Consistency
Question 642 :
What are the characteristics of process migration?
- transfer data by entire file or immediate portion required
- transfer the computation rather than the data
- execute an entire process or parts of it at different sites
- execute limited portion of data
Question 643 :
Which system call returns the process identifier of a terminated child?
- wait
- exit
- fork
- get
Question 644 :
Following is concerned with extension and improvements of distributed system -
- openness
- concurrency
- fault tolerance
- Resource sharing
Question 645 :
Fault tolerance is a ______ requirement that requires a system to continue to operate,even in the presence of faults
- Non-functional
- Functional
- Concurrent
- Redundant
Question 646 :
Each process should get fair chance to execute the critical region, defines which property of mutual exclusion?
- Safety
- Liveness
- Fairness
- Scheduling
Question 647 :
TCP is reliable _______ protocol which supports reliable point to point communication in distributed system.
- network
- transport
- communication
- system
Question 648 :
What are the advantages of file replication ?
- Improves availability -performance
- Decreases performance
- They are consistent
- Improves speed
Question 649 :
The characteristics of NFS protocol are i. Search for file within directory ii.Read a set of directory entries iii. Manipulate links and directories From given options, which one is true?
- i,iii
- ii,iii
- i,ii,iii
- iii
Question 650 :
State which of the following holds true in Process Migration Statement 1: In non preemptive process migration,Process may be migrated during the course of its execution Statement 2: In preemptive process migration,Process may be migrated before it starts executing on its source node
- Statement 1 is correct but statement 2 is false
- Statement 1 is false but statement 2 is correct
- Both the statements are incorrect
- Both the statements are correct
Question 651 :
The use of more information gives rise to_________.
- Information redundancy
- Time redundancy
- Physical redundancy
- Data Redundancy
Question 652 :
Select the correct sequence for process migration
- freezing the process- Transfer the process- forward the message- communicate between cooperating process
- Transfer the process- forward the message- communicate between cooperating process-freezing the process
- forward the message- communicate between cooperating process-freezing the process- Transfer the process
- communicate between cooperating process-freezing the process- Transfer the process- forward the message
Question 653 :
In the tree structured directories _____________
- the tree has the stem directory
- the tree has the leaf directory
- the tree has the root directory
- the tree has no any directory
Question 654 :
In______computing, underlying hardware consists of a collection of similar workstations or PCs closely connected by means of a high-speed local-area network and each node runs the same operating system.
- mobile computing
- cloud computing
- cluster computing
- Peer-to-peer computing
Question 655 :
The difference between logical and physical clocks?
- Logical clocks measure the time of day and Physical clocks are used to mark relationships among events in a distributed system
- Both are the same
- Physical clocks measure the time of day and Logical clocks are used to mark relationships among events in a distributed system.
- Both measures the time of day.
Question 656 :
How can we avoid deadlock
- Resource Allocation must be done at once
- there must be a fixed number of resources to allocate
- all deadlock process must be aborted
- inversion technique can be used
Question 657 :
_____ is a process that prevents multiple threads or processes from accessing shared resources at the same time.
- Critical section
- Deadlock
- Message passing
- Mutual Exclusion
Question 658 :
Which mutual exclusion algorithm is useful when the membership of the group is unknown?
- Centralized
- Lamport’s.
- Token ring
- Decentralized Algorithm
Question 659 :
In RMI, the objects are passed by _____.
- Value
- Reference
- Value and Reference
- object
Question 660 :
___________ is act between name servers and their clients.
- Name machine
- Context
- Name agents
- Main servers